Copy and Pasting Code? You Could be Spreading Vulnerabilities
Interview with Paul Anderson, VP of Engineering at GrammaTech
Threat Modeling for the Future
Video Interview with threat modeling expert, Adam Shostack
Critically Vulnerable Open Source Code Found in COTS Apps
Video interview with Michael Sampson
Loose Permissions in AWS Settings Cause Cloud Leakage
Interview at Black Hat USA with Shir Tami and Ami Luttwak from Wiz.io
The President Directs, NIST Shows Us How
Interview with Barbara Guttman, manager of the Software Quality Group at NIST, which is publishing new guidelines to support...
Auditing Software Artifacts | Video interview with Robert Seacord
Video interview with Robert Seacord, technical director in the assurance division at NCC Group and author of “Effective C” From...
DevOps and the Alternative Cloud
Video Interview with Security Strategist, Charles Kolodgy
Shifting Left at the RSA Security Conference
Deb Radcliff reports on DevSecOps happenings at May 17-20 RSA Conference
Managing Input in HP Edge OT Manager
Interview with Dr. Johannes Ullrich, SANS research director and faculty fellow
Clean Up Your Code Libraries | Q&A with Jim Manico
Jim Manico is the author of "Iron-Clad Java: Building Secure Web Applications” and founder of Manicode Security, which trains...